Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 8 of 8 white papers, page 1 of 1.
Process Optimization with Stratusphere UX
This whitepaper explores the developments of the past decade that have prompted the need for Stratusphere UX Process Optimization. We also cover how this feature works and the advantages it provides, including specific capital and operating cost benefits.

Managing the performance of Windows-based workloads can be a challenge. Whether physical PCs or virtual desktops, the effort required to maintain, tune and optimize workspaces is endless. Operating system and application revisions, user installed applications, security and bug patches, BIOS and driver updates, spyware, multi-user operating systems supply a continual flow of change that can disrupt expected performance. When you add in the complexities introduced by virtual desktops and cloud architectures, you have added another infinite source of performance instability. Keeping up with this churn, as well as meeting users’ zero tolerance for failures, are chief worries for administrators.

To help address the need for uniform performance and optimization in light of constant change, Liquidware introduced the Process Optimization feature in its Stratusphere UX solution. This feature can be set to automatically optimize CPU and Memory, even as system demands fluctuate. Process Optimization can keep “bad actor” applications or runaway processes from crippling the performance of users’ workspaces by prioritizing resources for those being actively used over not used or background processes. The Process Optimization feature requires no additional infrastructure. It is a simple, zero-impact feature that is included with Stratusphere UX. It can be turned on for single machines, or groups, or globally. Launched with the check of a box, you can select from pre-built profiles that operate automatically. Or administrators can manually specify the processes they need to raise, lower or terminate, if that task becomes required. This feature is a major benefit in hybrid multi-platform environments that include physical, pool or image-based virtual and cloud workspaces, which are much more complex than single-delivery systems. The Process Optimization feature was designed with security and reliability in mind. By default, this feature employs a “do no harm” provision affecting normal and lower process priorities, and a relaxed policy. No processes are forced by default when access is denied by the system, ensuring that the system remains stable and in line with requirements.

Introduction to Microsoft Windows Virtual Desktop
This whitepaper provides an overview of WVD and a historical perspective of the evolution of Windows desktops – especially multi-session Windows. This paper was authored by industry veterans with active involvement in multi-session Windows desktop computing since its inception in the early 1990s. Disclaimer: Professionals at Liquidware, a Microsoft WVD partner, authored this paper based on information available at the time of writing.
Microsoft announced the general availability of Windows Virtual Desktop (WVD) on September 30, 2019. The release came after an initial public-preview-evaluation program that lasted about six months. This whitepaper provides an overview of WVD and a historical perspective of the evolution of Windows desktops – especially multi-session Windows. This paper was authored by industry veterans with active involvement in multi-session Windows desktop computing since its inception in the early 1990s. Disclaimer: Professionals at Liquidware, a Microsoft WVD partner, authored this paper based on information available at the time of writing. Information regarding WVD is evolving quickly; consequently, readers should understand that this whitepaper (v2.0) presents the most up-to-date information available. Any inaccuracies in this paper are unintentional. Research and buying decisions are ultimately the readers’ responsibility.
Analyzing VMware Horizon Logons
While VMware Horizon provides a powerful virtualization platform, technologies and capabilities like Microsoft Windows, Active Directory, authentication, DNS, network, group policy, and third-party apps must work seamlessly to provide a great digital employee experience. This eBook will focus on improving the logon duration for EUC and VDI deployments.

While VMware Horizon provides a powerful virtualization platform, technologies and capabilities like Microsoft Windows, Active Directory, authentication, DNS, network, group policy, and third-party apps must work seamlessly to provide a great digital employee experience. This eBook will focus on improving the logon duration for EUC and VDI deployments.

And view this solution page for more information. 

Mind the Gap: Understanding the threats to your Microsoft 365 data
Download this whitepaper to learn more about how you can prevent, or mitigate, these common Microsoft 365 data threats: external threats like ransomware, malicious insiders, user-errors, accidental keystrokes, and retention policy gaps.
From corporate contacts to sensitive messages and attachments, email systems at all companies contain some of the most important data needed to keep business running and successful. At the same time, your office productivity suite of documents, notes, and spreadsheets created by your employees is equally vital.

Unfortunately, in both cases, protecting that data is increasingly challenging. Microsoft provides what some describe as marginal efforts to protect and backup data, leaving the majority of the burden on the customer.

Download this white paper to learn more about how you can prevent, or mitigate, these common Microsoft 365 data threats:
•    External threats like ransomware
•    Malicious insiders
•    User-errors and accidental keystrokes
•    Retention policy gaps and confusion

Weak Password Report - 2023
This year’s Weak Password Report highlights why passwords are still the weakest link in an organization’s network, and how stronger password policy enforcement can be your best defense. The 2023 password report unveils keys themes in password creation like the fact that 88% of passwords used in attacks were 12 characters or less. Download the report to uncover information from an analysis of 800 million breached passwords and passwords found in live attacks on our team’s honeypot network.

This year’s Weak Password Report highlights why passwords are still the weakest link in an organization’s network, and how stronger password policy enforcement can be your best defense.

The 2023 password report unveils keys themes in password creation that include:

  • ‘Soccer’ tops the related terms list with over 140,000 inclusions
  • Top 10 base words from the Nvidia breach
  • 88% of passwords used in attacks were 12 characters or less
  • The most common base term found in passwords used to attack networks across multiple ports is still password

Download the report to uncover information from an analysis of 800 million breached passwords and passwords found in live attacks on our team’s honeypot network.

5 Ways to Strengthen your Active Directory Password Policy
Microsoft Active Directory (AD) is arguably the most common identity and access management platform in today’s enterprise and as a result, a prime target for cyber-attacks. Microsoft Active Directory is used in approximately 90% of the Global Fortune 1000 companies as the primary means of authentication and authorization to resources. This statistical picture holds true in the SMB market as well. As a result, most organizations today use Active Directory to implement their password security and

Microsoft Active Directory (AD) is arguably the most common identity and access management platform in today’s enterprise and as a result, a prime target for cyber-attacks. Microsoft Active Directory is used in approximately 90% of the Global Fortune 1000 companies as the primary means of authentication and authorization to resources. This statistical picture holds true in the SMB market as well. As a result, most organizations today use Active Directory to implement their password security and password policies.

Active Directory, by default, contains the ability to create basic password policies. Are these enough to protect your organization from attackers? In this comprehensive guide we look at five ways to strengthen your existing Active Directory Password Policy and explore additional solutions available to ensure complete confidence in your first line of defense.

Let's look closer at native Active Directory password settings and see which settings are found in the default password policies businesses use with Active Directory. Download the whitepaper to learn the five ways to strengthen your Active Directory Password Policy.

Self-service password reset and remote work
Remote and hybrid work environments mean IT Service Desks have a new set of complex challenges to navigate while maintaining a trusted level of security. Navigate the IT service desk in a remote & hybrid work environment more efficiently.

Remote and hybrid work environments mean IT Service Desks have a new set of complex challenges to navigate while maintaining a trusted level of security. Navigate the IT service desk in a remote & hybrid work environment more efficiently.

We examine the common driver for Service Desk tickets including network access, cached credentials workarounds, and password resets. All of which can present unique cyber-security challenges that require change for increased efficiency, productivity and security.

Download the whitepaper to learn what the Specops Software cybersecurity team recommends increasing efficiency without sacrificing security.

Password Reset Calls Are Costing Your Organization Big Money
This whitepaper examines the challenges the help desk faces, especially with the prevalence of remote and hybrid work environments. The help desk has multiple workarounds and password resets to handle daily. On top of that there is the evolving landscape of unique cybersecurity challenges in a remote or hybrid-remote workforce that requires help desk staff to be extremely vigilant. See how your help desk can be seeing time and cost savings with a decrease in password resets, providing them with
This whitepaper examines the challenges the help desk faces, especially with the prevalence of remote and hybrid work environments. The help desk has multiple workarounds and password resets to handle daily. On top of that there is the evolving landscape of unique cybersecurity challenges in a remote or hybrid-remote workforce that requires help desk staff to be extremely vigilant. See how your help desk can be seeing time and cost savings with a decrease in password resets, providing them with an increased focus on the more complex problems.